CN102449667B - For entering the method and apparatus of monitoring - Google Patents

For entering the method and apparatus of monitoring Download PDF

Info

Publication number
CN102449667B
CN102449667B CN201080024088.0A CN201080024088A CN102449667B CN 102449667 B CN102449667 B CN 102449667B CN 201080024088 A CN201080024088 A CN 201080024088A CN 102449667 B CN102449667 B CN 102449667B
Authority
CN
China
Prior art keywords
code
visitor
enter
entering
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201080024088.0A
Other languages
Chinese (zh)
Other versions
CN102449667A (en
Inventor
约翰·米宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Schindler China Elevator Co Ltd
Original Assignee
Inventio AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventio AG filed Critical Inventio AG
Publication of CN102449667A publication Critical patent/CN102449667A/en
Application granted granted Critical
Publication of CN102449667B publication Critical patent/CN102449667B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/62Comprising means for indicating the status of the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention relates to a kind of method for entering monitoring, comprising the following steps.Identification code (ID) is sent to entering node (2) by mobile phone (1).If identification code (ID) is identified as effectively, then enter code (6 from entering node (2) to mobile phone (1) transmission; 7) and be presented on the display screen (1.1) of mobile phone (1).Obtained by camera (5) and enter code (6; 7), and if enter code (6; 7) be identified as effectively, then allowing to enter.

Description

For entering the method and apparatus of monitoring
Technical field
The present invention relates to a kind of method and apparatus for entering monitoring.
Background technology
WO2006/000618A2 discloses a kind of for the method for wireless input for the destination call of elevator.At this, required by mobile phone to set up wireless connections between the mobile phone of the personnel of lift car and elevator control gear in a first step.In the second step, the floor at elevator control gear identification personnel and personnel and select to belong to the files on each of customers of these personnel.Subsequently, elevator control gear by means of this files on each of customers determination destination floor and be responsible for providing the lift car of the floor gone at these personnel for these personnel and this destination floor backward travel.
Document JP2005-280882 discloses a kind of elevator with security system, adopts mobile phone identification personnel in this elevator.Obtain to make these personnel and enter the license of elevator, the identification code utilizing optical read device to obtain to be presented on the display screen of mobile phone and be delivered to recognition unit.If this identification code and personnel put on record on recognition unit, then these personnel obtain the license entering elevator.
Summary of the invention
The object of the invention is to, proposing the method and apparatus entering monitoring for entering buildings, construction zone, room, lift car or elevator.Here should guarantee that the personnel only really with access entitlements obtain access admittance.The manipulation for the purpose of abusing should be avoided as far as possible.
This object is by having realizing for the method entering monitoring of the feature of claim 1.
Comprise the following steps according to the method for entering monitoring of the present invention.Identification code is sent to entering node by mobile phone.If identification code is identified as effectively, then enters code from entering node to mobile phone transmission and be presented at the display screen of mobile phone.Obtained by camera and enter code, and if this enter code and be identified as effectively, then allow to enter.
Favourable improvement of the present invention limits in the feature of dependent claims.
According in an embodiment of method of the present invention, identification code is the telephone number of mobile phone.
According in another embodiment of method of the present invention, entering code is two-dimension optical code.
According in the 3rd embodiment of method of the present invention, entering code is data matrix code or QR code.
In addition, in the method according to the invention, identification code is delivered to control module from entering node, and subsequently, control module checks whether this identification code is included in the list of the identification code with permission.If this is the case, code is entered to entering node transmission.
In addition favourable also have, if this for enter monitoring method in allow to enter, then provide an elevator for.
In improving according to one of method of the present invention, enter code and limit effective within a certain period of time.Therefore, the risk of abuse is further reduced.
In improving according to of the present invention another, enter code and only can be only used once.Therefore, the risk of abuse is further reduced.
What can be used to buildings, construction zone, lift car or elevator according to method of the present invention enters monitoring.
Comprising mobile phone according to equipment of the present invention and entering node for the method implementing to enter monitoring, enter node and designed as follows and can work as follows: it can receive the identification code of mobile phone and can enter code to mobile phone transmission.This equipment also comprises control module, and this control module is designed as follows and can work as follows: it can detect identification code and can enter code.Arrange optical pickup in addition, it is connected with control module.
In a device in accordance with the invention, optical pickup is scanner or camera.
Finally also propose a kind of computer program, it is stored on the media that can be used by computing machine, containing the procedure code that can be read by computing machine, and is responsible for making the computer-implemented above-mentioned method for entering monitoring.This computing machine can be control module or the parts entering node.
Accompanying drawing explanation
The present invention is elaborated with reference to accompanying drawing below by means of four embodiments.
Fig. 1 shows in block form an according to one of the equipment for entering monitoring of the present invention possible embodiment.
Fig. 2 shows an example for data matrix code.
Fig. 3 shows an example for QR code.
Fig. 4 shows the process flow diagram of setting forth according to the method for entering monitoring of the present invention.
Fig. 5 shows another example according to the method for entering monitoring of the present invention.
Embodiment
Embodiments of the present invention are set forth below by means of Fig. 1 to 4.Show in block form an in FIG according to one of the equipment for entering monitoring (Zugangskontrolle) of the present invention possible embodiment.Fig. 4 shows the process flow diagram for setting forth an embodiment according to the method for entering monitoring of the present invention.
Obtain the license entering buildings, construction zone (as room or elevator 9) to make personnel, these personnel can be identified entering node 2 place accordingly by its mobile phone 1, enter node 2 and are also called access point AP below.Enter in the coverage of node 2 once these personnel and mobile phone 1 thereof arrive, then by dedicated radio link 8 identification code ID is sent to from mobile phone 1 and enters node 2 (step S1).
Dedicated radio link 8 can realize as by bluetooth.Bluetooth is a kind of standard according to IEEE802.15.1 and is used through shorter distance instrument wireless connections are become network.In addition, bluetooth yet forms both interface, mobile phone 1 with enter node 2 can by the mutual communication of this interface.
Enter node 2 and be equipped with corresponding antenna 2.1 for this reason.After entering node 2 and receiving identification code ID, its by identification code relay transmission to control module 3 (step S2).Control module 3 can be such as server.Enter node 2 and control module 3 is spatially provided separately usually.But this is not obsessive.Can also arrange between floors and multiplely enter node 2, it is all connected with control module 3.
Identification code ID is the telephone number of mobile phone 1 in an advantageous manner.But also can be arranged to, use the personnel of mobile phone 1 must input certain code, such as password by the keyboard 1.2 of mobile phone 1, this code is delivered to by dedicated radio link 8 subsequently and enters node 2.In the case, the code inputted by keyboard 1.2 is consistent with identification code ID.
In another step S3, server 3 detects and receives identification code ID.If this identification code ID is considered to (the step S4) that be not allowed to, then server 3 notice enters these personnel of node 2 and is denied access to a certain equipment, such as elevator 9 (step S5).If identification code ID is construed to be allow (step S4) in contrast, then server 3 enters code (step S6) and is delivered to and enters node 2.Enter code and be also referred to as optical code below.
Entering code may be limited in certain hour effective.Therefore the personnel that achieve only allow to enter in interval sometime.Can be arranged in addition, identification code is only once effective, thus makes it can not be used after being only used once again.Therefore abuse is prevented.Like this, mobile phone 1 can not be realized entering with the same code that enters by other librarian use.
Can be arranged in addition: once the personnel of carrying mobile phone 1 are allowed to enter, then continue to enter with same mobile phone 1 for certain time interval and/or for certain node locking that enters.Thus prevent mobile phone 1 given another personnel realize with this mobile phone realize enter.
Can by server 3 occur such as data matrix code 6 as entering code.Fig. 2 shows the example for this type of data matrix code 6.The concept of code does not represent the encryption of the data securely obtaining data in this association, but represents figure reflection (grafischeAbbildung) of the data of binary-coded character.Data matrix code is two-dimensional bar or 2D code, and it exists with different patterns, such as " ECCn ".ECC represents error detection and correction algorithm and n below represents value between 0 to 200.The pattern that can the most reliably read is ECC200 pattern.The size of the code image of square or rectangle is determined from larger selection quantity, and the character element of code image is square or circular.Data matrix code International Standards Organization (ISO) to put on record as standard and ISO specification ISO/IEC16022:2000 and ISO/IEC24720:2006 and other application standard, as DIN standard or DIN-EN standard in put on record.These standards are enforceable in the industrial production.Ensure that by adopting standardized code the manufacturer that code can have nothing to do in scrambler or reader is read.
For data matrix code 6, information square or rectangle plane in the form coding of the pattern of the point of formed objects.These points are etuis of black or white, and it is interconnected or has round dot betwixt, and these round dots have space.Unified character boundary and fixing character pitch make the reading of image and the decoding of information become safety and make data matrix code extension in the plane compact.When reading data matrix code, obtain in the frame being arranged in inside, edge and matrix of point.
Data matrix code 6 comprises the data of redundancy, thus makes the mistake that such as can correct maximum 25% with Reed-Solomon error correction when ECC200 in code pattern.This is covered or be very favorable when not can read in code pattern part.
Alternatively, such as also can there is QR code 7 as entering code by server 3 for this reason.Fig. 3 shows an example for this type of QR code 7.QR code 7 is bar code or the 2D code of two dimension equally, and wherein, QR represents rapid answer (QuickResponse).
In QR code 7, the encryption of the concept of code also not representative data, but the data mapping in binary-coded character.The square matrices that QR code 7 is made up of the point of black and white is formed, and these points represent the data of the coding in binary system.Special marking in foursquare three or four angles has preset orientation.In QR code, there are data redundantly, even make the QR code of maximum 30% damaged, it also can correctly be read.Utilize QR code 7 can store maximum 7089 digits, 4296 letter characters or 2953Byte.Standard for QR code can find in iso standard ISO/IEC18004.
Data matrix code 6 and QR code 7 all can utilize optical pickup 5, such as scanner or camera machine to read.The data be included in code 6 and 7 can continue process subsequently electronically.
After server 3 enters code 6 or 7 and is delivered to and enters node 2, to send to mobile phone 1 by dedicated radio link 8 enter code 6 or 7 from entering node 2 in step 7.
Then, on the display screen 1.1 of mobile phone 1, display enters code 6 or 7 in step s 8.This can be entered code and be shown to camera 5 by the user of mobile phone 1, and the image entering code that has of picked-up is sent to server 3 (step S10) by it.Whether server 3 inspection enters code is allow (step S11).This can such as realize as follows: the code that enters that code and server be sent to mobile phone 1 that enters absorbed by camera 5 compares by server 3.If enter code to be considered (the step S11) that be allowed to, server 3 notice enters node 2, and these personnel are allowed to enter (step S12).If enter code to be considered in contrast (the step S11) that be not allowed to, then notified to enter node 2 by server 3, these personnel are denied access to or use a certain equipment, such as elevator 9 (step S13).If refusal enters elevator 9, then control module 3 notifies the elevator control gear 4 for controlling elevator 9.Elevator control gear 4 imports corresponding measure subsequently.
The concept entering (Zugang) is understood to general concept in current context relation, and it not only comprises and allows to enter buildings, room or lift car, also comprises and allows to use instrument or equipment, such as elevator.
Fig. 5 shows according to Fig. 1 to 4 for entering the process flow diagram of another example according to method of the present invention of monitoring.
Buildings always enters monitoring by electronics and ensures safety.The resident family of buildings or the staff gone to work in this buildings also can receive the visitor of the access entitlements without this buildings.In order to enable these visitors be allowed to enter in simple and efficient mode, can use according to Fig. 1 to 4 adopt according to the method for entering monitoring of the present invention.
In step 1, the resident family of buildings or the staff that goes to work between floors propose to the request of equipment by means of communication unit 10 (such as computing machine, PDA, mobile phone etc.) to control module 3 for the visitor without access entitlements or set up the request of files on each of customers for this visitor.
This request can comprise at least one rule, such as sets up by means of web application, suitable computer program, meeting agreement or management application program etc. and is sent to control module 3.Meet with agreement or manage application program and represent the Notes of such as Lotus Development, Outlook of Microsoft etc.
Control module 3 is set up files on each of customers according at least one rule in the second step and for this files on each of customers, identification code is sent to the mobile phone 1 of visitor.
This at least one rule can be arbitrary.It is determined by communication unit 10 and/or by control module 3.It is contemplated that this at least one rule is, do not adopt rule.It can also depend on demand for security, user's request (such as disabled person enter etc.), visitor's demand etc.Such as can define a time window as at least one rule, allow to enter in this time window, thus make to enter only effective provisionally.At least one rule can also be detected before whether visitor be positioned at buildings before allowing to enter.Another rule can be, visitor's edge to access when entering buildings stops path monitored or tracking by means of suitable supervisory system in place.If this visitor obtains the possibility more than once entering, then can determine entry time point by means of at least one rule.Such as can specify, this visitor should only enter to 17 o'clock 14 o'clock Fridays respectively.
As described in Fig. 1 to 4, identification code can be sent to mobile phone 1 with method from control module 3 in a different manner.It can such as in note, in the e-mail, obtain in radio station or speech message etc. and be such as made up of password, sound, tune, language, alphabetic string, link etc.
Files on each of customers can comprise the data that at least one allows the certification of visitor.But it is also conceivable to the examination possibility that files on each of customers only comprises this few rule and identification code.
The identification code being used for requirement and entering code is sent to control module 3 by mobile phone 1 in third step.Optionally, according to step 3 ' identification code can be sent to control module 3 from mobile phone 1 by entering node 2.This interchangeable mode describes in Fig. 1 to Fig. 4.In this case advantageously, can determine whether visitor stays in the entrance area of buildings simultaneously.
Control module 3 detects according to step 4 identification code that obtains from mobile phone 1 and the verify data of this yard with files on each of customers and the examination possibility wherein comprised and/or visitor is compared.The original identification code, telephone number, name, random value etc. that send to mobile phone 1 such as can be adopted as examination possibility or certification possibility.Suitable algorithm such as can be utilized from identification code that is original and that send before, to calculate cryptographic hash (Hash-Werte) and compared by control module 3.If the identification code sent and files on each of customers or with preservation or the comparing of data be stored in files on each of customers draw effective value before, then occurred by control module 3 and send to mobile phone 1 to enter code, such as numeric string, Quick Response Code, QR code, data matrix code, bar code, image etc.
Alternatively, according to step 4 ' can also realize entering code transmission from control module 3 to mobile phone 1 through entering node 2.
The code that enters that the output device (such as display) of mobile phone illustrates to be obtained by optical pick-up unit 5 according to the 5th step and enters node 2 according to step 6 ' process or be directly sent to control module 3 according to step 6.
Whether effectively or be allowed to control module 3 detects to enter code according to step 7 according at least one rule in files on each of customers and/or according to files on each of customers.If it is effective to enter code, by control module 3 access admittance is sent to and enters node 2 and allow visitor to enter buildings thus.
If files on each of customers comprises the rule that at least one should notify interviewee, then send message, such as note, Email, voice messaging etc. from control module 3 to communication unit 10 according to step 8, thus make interviewee know the arrival of visitor.
What describe is only used as schematic description according to embodiments of the invention and is not used in restriction the present invention before.Different changes and change can also be realized in category of the present invention, and scope of the present invention and its equivalent scope can not be exceeded.Such as replace camera and can also use scanner, in order to detect the display screen 1.1 of mobile phone 1 enters code 6 or 7.

Claims (11)

1., for entering a method for monitoring, comprise the following steps:
Enter node (2) and receive identification code (ID) from the mobile phone (1) of visitor, wherein, files on each of customers is set up for the visitor without access entitlements, described files on each of customers contains the rule that at least one should notify interviewee, the message of the interviewee arriving described visitor about visitor is sent from control module (3) to communication unit, thus make interviewee know the arrival of visitor
After identification code (ID) is identified as effectively, enter code (6 from entering mobile phone (1) transmission of node (2) to visitor; 7),
Obtained by optical pickup (5) and enter code (6; 7) code (6 is entered; 7) be presented on the display screen (1.1) of the mobile phone (1) of visitor,
Entering code (6; 7), after being identified as effectively, allow to enter.
2. the method for claim 1, wherein identification code (ID) is the telephone number of the mobile phone (1) of visitor.
3. method as claimed in claim 1 or 2, wherein, enters code (6; 7) be two-dimension optical code.
4. method as claimed in claim 1 or 2, wherein, enters code (6; 7) be data matrix code (6) or QR code (7).
5. method as claimed in claim 1 or 2, wherein,
Identification code (ID) is delivered to control module (3) from entering node (2),
Control module (3) checks whether identification code (ID) is included in the list of the identification code with license, if identification code (ID) is included in described list, enters code (6 to entering node (2) transmission; 7).
6. method as claimed in claim 1 or 2, wherein, if allow to enter, then provide an elevator (9) for.
7. method as claimed in claim 1 or 2, wherein, enters code (6; 7) restriction is effective within a certain period of time.
8. method as claimed in claim 1 or 2, wherein, enters code (6; 7) only can be only used once.
9. an application for the method according to any one of claim 1-8, for entering monitoring to buildings or construction zone or elevator (9).
10., for implementing an equipment for the method for entering monitoring according to any one of claim 1-8, comprise
Enter node (2), it is designed as follows and can be worked as follows: it can receive the identification code (ID) of the mobile phone (1) of visitor and can enter code (6 to the mobile phone of visitor (1) transmission; 7),
Control module (3), it is designed as follows and can be worked as follows: it can detect identification code (ID) and can produce and enter code (6; 7), described control module (3) can also set up files on each of customers for the visitor without access entitlements, described files on each of customers contains the rule that at least one should notify interviewee, control module (3) can send the message at the interviewee place arriving described visitor about visitor to communication unit, thus make interviewee know the arrival of visitor, and
Optical pickup (5), it is connected with control module (3).
11. equipment as claimed in claim 10, wherein, optical pickup (5) is scanner or camera.
CN201080024088.0A 2009-04-03 2010-04-01 For entering the method and apparatus of monitoring Active CN102449667B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP09157266A EP2237234A1 (en) 2009-04-03 2009-04-03 Method and device for access control
EP09157266.9 2009-04-03
PCT/EP2010/054421 WO2010112586A1 (en) 2009-04-03 2010-04-01 Method and device for access control

Publications (2)

Publication Number Publication Date
CN102449667A CN102449667A (en) 2012-05-09
CN102449667B true CN102449667B (en) 2016-02-17

Family

ID=40999821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201080024088.0A Active CN102449667B (en) 2009-04-03 2010-04-01 For entering the method and apparatus of monitoring

Country Status (9)

Country Link
US (1) US10068395B2 (en)
EP (2) EP2237234A1 (en)
CN (1) CN102449667B (en)
AU (2) AU2010230205B2 (en)
CA (1) CA2757405C (en)
MY (1) MY169822A (en)
PL (1) PL2415029T3 (en)
SG (1) SG175010A1 (en)
WO (1) WO2010112586A1 (en)

Families Citing this family (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2237234A1 (en) 2009-04-03 2010-10-06 Inventio AG Method and device for access control
PL2697783T3 (en) * 2011-03-29 2014-11-28 Inventio Ag Distribution of premises access information
ITTV20110153A1 (en) * 2011-11-08 2013-05-09 Visionee S R L VIDEO DOOR PHONE SYSTEM
DE102012004259A1 (en) * 2012-03-02 2013-09-05 Abb Ag Device for device configuration of at least one device of building system technology or door communication
DE102012205379A1 (en) * 2012-03-20 2013-09-26 S. Siedle & Söhne Telefon- und Telegrafenwerke OHG Method and system for carrying out a building access control
DE102012006013A1 (en) * 2012-03-24 2013-09-26 Abb Ag Access control of a door communication device or building system technology device
DE102012006012A1 (en) 2012-03-24 2013-09-26 Abb Ag Method for automatic triggering of switching action in electric door opener of house communication system or building technology system, involves performing triggering as soon as authentication provides authorization of beneficiary/user
DE102012008657A1 (en) * 2012-05-03 2013-11-07 Torben Friehe Method for transmitting data for actuating a device for opening a lock
DE102012009128A1 (en) 2012-05-05 2013-11-07 Abb Ag Method for communication between a mobile terminal and a device of building system technology or door communication
EP2888855B1 (en) 2012-08-21 2018-12-19 Onity Inc. Systems and methods for lock access management using wireless signals
FR2997527B1 (en) * 2012-10-31 2015-12-25 Alpha Centauri METHOD FOR CONTROLLING ACCESS TO A LOCAL BY READING A GRAPHIC CODE PRESENT ON A COUPON OF ACCESS, SYSTEM AND COMPUTER PROGRAM.
WO2014116182A1 (en) * 2013-01-25 2014-07-31 Hitachi Elevator Asia Pte Ltd System, device and method for controlling lift access and computer-readable medium storing computer-readable program for lift access
DE102014106364A1 (en) 2013-05-13 2014-11-13 Hakan Orcan System for checking access authorization for a locking device
DE202013004667U1 (en) * 2013-05-13 2013-07-31 Hakan Orcan The virtual key
US9198041B2 (en) * 2013-08-05 2015-11-24 Nextek Power Systems, Inc. Method of and system for authenticating a user to operate an electrical device
TWI658717B (en) * 2013-10-01 2019-05-01 瑞士商伊文修股份有限公司 Access control method, access control system and computer-readable storage medium
WO2015099990A1 (en) * 2013-12-24 2015-07-02 Hoeffner Daren Method and system of controlling access to access points
CN105197700A (en) * 2014-06-05 2015-12-30 三菱电机上海机电电梯有限公司 Visitor system taking two-dimensional code as medium for elevator and control method thereof
DE102014008654A1 (en) * 2014-06-13 2015-12-17 Wago Verwaltungsgesellschaft Mbh Temporary permission
DE102015100127A1 (en) * 2014-10-15 2016-04-21 Klaus Multiparking Gmbh Method and system for controlling a car parking device
DE102014116183A1 (en) 2014-11-06 2016-05-12 Bundesdruckerei Gmbh Method for providing an access code on a portable device and portable device
SG11201703777TA (en) 2014-12-02 2017-06-29 Inventio Ag Access control system with feedback to portable electronic device
MX367662B (en) 2014-12-02 2019-08-30 Inventio Ag Improved access control using portable electronic devices.
CN104537736A (en) * 2014-12-23 2015-04-22 韶关市英诺维科技设备有限公司 Application of two-dimension code lock in business management
RU2697827C2 (en) 2015-01-27 2019-08-21 Филипс Лайтинг Холдинг Б.В. Proximity detection for device control
CN104724558B (en) * 2015-03-02 2016-04-20 上海电力学院 A kind of initiatively reservation type intelligent elevator dispatching system
US9972144B2 (en) 2015-03-24 2018-05-15 At&T Intellectual Property I, L.P. Automatic physical access
US9582841B2 (en) 2015-03-24 2017-02-28 At&T Intellectual Property I, L.P. Location based emergency management plans
US9824515B2 (en) 2015-03-24 2017-11-21 At&T Intellectual Property I, L.P. Automatic calendric physical access
US10296851B2 (en) 2015-04-11 2019-05-21 At&T Intellectual Property I, L.P. Automatic allocation of physical facilities for maximum collaboration
US20210049850A1 (en) * 2016-02-29 2021-02-18 Inventio Ag Checking access authorizations using mobile control devices
EP3440854B1 (en) 2016-04-06 2020-09-16 Otis Elevator Company Mobile visitor management
WO2017189820A1 (en) * 2016-04-27 2017-11-02 Cubic Corporation 4d barcode
DE102016108013B3 (en) * 2016-04-29 2017-06-14 Fujitsu Technology Solutions Intellectual Property Gmbh Method for a system for safely opening a door and system for safely opening a door
CN105844758B (en) * 2016-05-20 2018-01-12 广州邻礼信息科技有限公司 A kind of system and implementation method of property resident user and visitor's room entry/exit management
CN106097531B (en) * 2016-08-10 2019-08-13 深圳博科智能科技有限公司 A kind of reserving method and mobile terminal and access control system applied to access control system
CN106548224A (en) * 2016-10-25 2017-03-29 中冶华天工程技术有限公司 A kind of IC card management system and management method based on Quick Response Code
JP6642380B2 (en) * 2016-10-31 2020-02-05 フジテック株式会社 Elevator system
EP3340095B1 (en) * 2016-12-23 2020-07-08 Löwenstein Medical Technology S.A. Ventilation system and method
MX2019008232A (en) * 2017-01-09 2019-10-24 Carrier Corp Access control system with messaging.
EP3610465A1 (en) 2017-04-10 2020-02-19 Inventio AG Access control system having radio and facial recognition
EP3610466B1 (en) 2017-04-10 2024-05-01 Inventio Ag Visitor registration and access control method
US20200290842A1 (en) 2017-06-07 2020-09-17 Inventio Ag Elevator system with visitor operating mode
US10397691B2 (en) * 2017-06-20 2019-08-27 Cubic Corporation Audio assisted dynamic barcode system
CN111051639B (en) 2017-09-01 2022-05-17 亚萨合莱自动门系统有限公司 Arrangement of an access system with one or more movable door members
US20190084794A1 (en) * 2017-09-20 2019-03-21 Otis Elevator Company Elevator request authorization system
US10875741B2 (en) 2017-09-29 2020-12-29 Otis Elevator Company Elevator request authorization system for a third party
EP3729385B1 (en) * 2017-12-20 2022-06-22 Inventio AG Access control system with wireless authentication and password entry
WO2019121335A1 (en) 2017-12-20 2019-06-27 Inventio Ag Access control system having radio and facial recognition
US10865069B2 (en) 2018-09-18 2020-12-15 Otis Elevator Company Effecting communication bridge with elevator system
WO2020074360A1 (en) 2018-10-12 2020-04-16 Inventio Ag System and method for position determination in a building
AU2019358373B2 (en) 2018-10-12 2022-10-06 Inventio Ag Access control system and method for operating an access control system
CN111091644B (en) 2018-10-24 2022-12-13 奥的斯电梯公司 Authorization management of elevator service requests and authorization requests
US20220074255A1 (en) 2018-12-21 2022-03-10 Inventio Ag Access control system with sliding door with object monitoring function
WO2020126644A1 (en) * 2018-12-21 2020-06-25 Inventio Ag Access control system with sliding door with a gesture control function
CN111615017A (en) * 2019-02-26 2020-09-01 颜振 System for achieving function of interphone by using two-dimensional bar code
CN113518846B (en) 2019-03-08 2022-10-25 因温特奥股份公司 Access control system with moving door and visual status information
SG11202109749QA (en) * 2019-04-09 2021-10-28 Kone Corp Access right management
EP3959483A1 (en) 2019-04-26 2022-03-02 Inventio AG Access control system and method for operating an access control system
IT201900011634A1 (en) * 2019-07-12 2021-01-12 Matichotels Srl Access release system of a structure and associated method
KR102281798B1 (en) * 2019-10-07 2021-07-26 이기철 Multiple Locks with Random Passwords
AU2020403827A1 (en) 2019-12-16 2022-06-30 Inventio Ag Human-machine interface device for building systems
EP4078543A1 (en) 2019-12-20 2022-10-26 Inventio Ag Building system for private user communication
CN115427335A (en) * 2020-04-29 2022-12-02 通力股份公司 Scheme for generating non-contact elevator call
EP4154224A1 (en) 2020-05-18 2023-03-29 Inventio Ag Additional zone monitoring for a building door
US20230272658A1 (en) 2020-07-31 2023-08-31 Inventio Ag Building wall module with automatic doors for users and postal delivery
AU2021323970A1 (en) * 2020-08-13 2023-03-09 Inventio Ag Building system with elevator call entry via offline QR code credential
JP7437521B2 (en) * 2020-09-16 2024-02-22 株式会社日立製作所 In-building traffic flow setting device and in-building traffic flow setting method
CN112802233B (en) * 2020-12-28 2021-11-12 徐永贵 Generation and unlocking method, device, equipment and storage medium of laboratory electronic door lock
CN112978526B (en) * 2021-03-11 2023-04-28 郭强 Access control method, equipment and system and elevator control method, equipment and system
BE1029318B1 (en) * 2021-04-16 2022-11-21 Nine Eng PROCEDURE FOR ACCESS CONTROL TO A PROTECTED ZONE
ES2937716B2 (en) * 2021-09-28 2023-07-31 Laliga Content Prot Sl Access control procedure and system
WO2024002637A1 (en) 2022-06-30 2024-01-04 Inventio Ag Access control system with barrier-free access
US12002315B2 (en) * 2022-10-12 2024-06-04 Truist Bank Virtual identification for granting secure access using varying forms of readable access codes

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001041081A2 (en) * 1999-12-03 2001-06-07 First Hop Oy A method and a system for obtaining services using a cellular telecommunication system
WO2006000618A2 (en) * 2004-06-28 2006-01-05 Kone Corporation Elevator arrangement
FR2873217A1 (en) * 2004-07-19 2006-01-20 Francois Pierre Desgigot Pocket electronic device e.g. mobile telephone, controlling method for e.g. building, involves displaying bar codes on screen of electronic device, and showing bar codes to bar code reader so as to be decrypted
CN1838595A (en) * 2005-03-25 2006-09-27 日本电气株式会社 The authentication system and the authentication method which use a portable communication terminal

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4655324A (en) * 1985-09-23 1987-04-07 Otis Elevator Company Method for privately controlling an elevator
JP2003515688A (en) * 1999-11-30 2003-05-07 ボーディング データ エーエス Electronic key device, system, and method for managing electronic key information
US6993123B1 (en) * 2000-03-10 2006-01-31 Verizon Services Corp. Intelligent access control system
US7133659B2 (en) * 2000-09-29 2006-11-07 Nokia Mobile Phones Limited Methods of operating a reservation system using electronic device cover with embedded transponder
TWI282941B (en) * 2001-03-15 2007-06-21 Toshiba Corp Entrance management apparatus and entrance management method by using face features identification
FI20010930A0 (en) * 2001-05-04 2001-05-04 Lauri Veikko Raeisaenen A method and apparatus for indicating direction in a cellular network
US6811078B2 (en) * 2002-01-17 2004-11-02 Monica L. Workens Point-of-transaction machine with improved versatility and related method
US7222241B2 (en) * 2002-02-25 2007-05-22 Info Data, Inc. Building security and access protection system
US7428413B2 (en) * 2003-03-11 2008-09-23 Wayport, Inc. Method and system for providing network access and services using access codes
US20060100779A1 (en) * 2003-09-02 2006-05-11 Vergin William E Off-board navigational system
US7387250B2 (en) * 2003-12-04 2008-06-17 Scanbuy, Inc. System and method for on the spot purchasing by scanning barcodes from screens with a mobile device
JP4541741B2 (en) 2004-03-29 2010-09-08 東芝エレベータ株式会社 Elevator system
FI117010B (en) * 2004-11-01 2006-05-15 Kone Corp Elevator remote control
WO2006114613A1 (en) * 2005-04-25 2006-11-02 Mobiqa Limited Mobile ticket authentication
US20060293929A1 (en) * 2005-06-23 2006-12-28 Chunghwa Telecom Co., Ltd. Electronic-ticket service system based on color-scale-code image recognition
MY151605A (en) * 2005-07-28 2014-06-30 Inventio Ag Method of controlling access to an area
US7377426B1 (en) 2005-09-01 2008-05-27 Todd Makeever Interactive visitor announcement/access control system
KR101286392B1 (en) * 2005-09-30 2013-07-15 인벤티오 아게 Lift installation for transporting lift users inside a building
PL1833219T3 (en) * 2006-03-08 2015-01-30 Monitise Ltd Methods, apparatus and software for using a token to calculate time-limited password within cellular telephone
WO2007132748A1 (en) * 2006-05-12 2007-11-22 Nec Corporation Information processing system, information processing method, and device and program used for the information processing system and the information processing method
US7920851B2 (en) * 2006-05-25 2011-04-05 Celltrust Corporation Secure mobile information management system and method
US8280359B2 (en) * 2006-05-25 2012-10-02 Celltrust Corporation Methods of authorizing actions
JP4996175B2 (en) * 2006-08-29 2012-08-08 株式会社東芝 Entrance management system and entrance management method
US20100020970A1 (en) * 2006-11-13 2010-01-28 Xu Liu System And Method For Camera Imaging Data Channel
US8656472B2 (en) * 2007-04-20 2014-02-18 Microsoft Corporation Request-specific authentication for accessing web service resources
US8272038B2 (en) * 2008-05-19 2012-09-18 International Business Machines Corporation Method and apparatus for secure authorization
US8342407B2 (en) * 2008-07-21 2013-01-01 Gilbarco, Inc. System and method for pairing a bluetooth device with a point-of-sale terminal
EP2237234A1 (en) 2009-04-03 2010-10-06 Inventio AG Method and device for access control
WO2011150405A2 (en) * 2010-05-28 2011-12-01 Suridx, Inc. Wireless encrypted control of physical access systems
US20120298737A1 (en) * 2011-05-26 2012-11-29 Thales Avionics, Inc. Methods, apparatuses and articles of manufacture to provide passenger preference data to in-flight entertainment systems

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001041081A2 (en) * 1999-12-03 2001-06-07 First Hop Oy A method and a system for obtaining services using a cellular telecommunication system
WO2006000618A2 (en) * 2004-06-28 2006-01-05 Kone Corporation Elevator arrangement
CN1976855A (en) * 2004-06-28 2007-06-06 通力股份公司 Elevator arrangement
FR2873217A1 (en) * 2004-07-19 2006-01-20 Francois Pierre Desgigot Pocket electronic device e.g. mobile telephone, controlling method for e.g. building, involves displaying bar codes on screen of electronic device, and showing bar codes to bar code reader so as to be decrypted
CN1838595A (en) * 2005-03-25 2006-09-27 日本电气株式会社 The authentication system and the authentication method which use a portable communication terminal
EP1705595A2 (en) * 2005-03-25 2006-09-27 NEC Corporation The authentication system and the authentication method which use a portable communication terminal

Also Published As

Publication number Publication date
AU2016202519A1 (en) 2016-05-12
EP2415029A1 (en) 2012-02-08
AU2010230205A1 (en) 2011-11-03
PL2415029T3 (en) 2020-07-27
EP2237234A1 (en) 2010-10-06
AU2010230205B2 (en) 2016-05-12
WO2010112586A1 (en) 2010-10-07
US10068395B2 (en) 2018-09-04
SG175010A1 (en) 2011-11-28
CA2757405A1 (en) 2010-10-07
MY169822A (en) 2019-05-16
CA2757405C (en) 2018-05-29
US20120068818A1 (en) 2012-03-22
CN102449667A (en) 2012-05-09
EP2415029B1 (en) 2020-02-12
AU2016202519B2 (en) 2017-05-25

Similar Documents

Publication Publication Date Title
CN102449667B (en) For entering the method and apparatus of monitoring
US9286741B2 (en) Apparatus and method for access control
US8922336B2 (en) Entry/exit control system and method using shared codes combined with user personal information
US8881252B2 (en) System and method for physical access control
CN105046775B (en) Time domain Quick Response Code tripper
JP5164448B2 (en) Legitimacy authentication system and legitimacy authentication method
CN109074693B (en) Virtual panel for access control system
CN109360314A (en) Reserve access method, system, computer equipment and storage medium
US9911260B2 (en) Associating external credentials with mobile devices
AU2012234407A1 (en) Distribution of premises access information
US11763615B2 (en) Method for controlling package delivery
CN101930557B (en) A kind of method and system of improving article delivery safety
WO2007029922A1 (en) Multiple code service system and method thereof
US11736473B2 (en) Identifiers and access tokens for privacy in centralized address management
JP2009086891A (en) Content management device, its program, and content management method
JP2007048127A (en) Attendance management system, portable communication device and program
US12020525B2 (en) Property management systems
TW201537521A (en) Automatic visitor system and host thereof
JP2008293137A (en) Individual management apparatus and program
JP2008087957A (en) Elevator facility safety management system
JP2007293508A (en) Attendance management system, path code issuing device, attendance circumstance judging device and program
JP2006219857A (en) Entry and withdrawal control method control system
US7905392B2 (en) Code collection in mobile device
KR20200025320A (en) Work management system and method using location information
CN106411898B (en) A kind of electronics core label method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231206

Address after: No. 555 Xingshun Road, Jiading District, Shanghai

Patentee after: SCHINDLER (CHINA) ELEVATOR Co.,Ltd.

Address before: Swiss Helge Sitwell

Patentee before: Inventio AG

TR01 Transfer of patent right